{"id":27786,"date":"2025-07-24T11:26:38","date_gmt":"2025-07-24T16:26:38","guid":{"rendered":"https:\/\/fleishmanhillard.com\/?p=27786"},"modified":"2025-07-24T11:29:05","modified_gmt":"2025-07-24T16:29:05","slug":"it-communcations-partnership","status":"publish","type":"post","link":"https:\/\/fleishmanhillard.com\/2025\/07\/it-communcations-partnership\/","title":{"rendered":"The Friends You Never Knew You Needed: Why IT and Communications Must Team Up"},"content":{"rendered":"<div class=\"container\">\n                                            <div class=\"row\">\n                                                <div class=\"col-md-10 col-lg-9 offset-lg-1\">\n                                                    <p>Trust is at the heart of every successful organization. In today\u2019s digital landscape, that trust is built\u2014and sometimes shattered\u2014by how well you protect the data on your network. Reputation is hard-won and easily lost, making it a favorite pressure point for cybercriminals and regulators alike.<\/p>\n\n                                                <\/div>\n                                            <\/div>\n                                        <\/div>\n\n<div class=\"container\">\n                                            <div class=\"row\">\n                                                <div class=\"col-md-10 col-lg-9 offset-lg-1\">\n                                                    <p>Over the past several years, threat actors have shifted tactics. Rather than relying solely on operational disruptions driven by ransomware, groups like Lapsu$ have gone as far as exposing sensitive corporate data without warning or attempted extortion, as seen in their attacks on some of the tech industry\u2019s top companies.<\/p>\n\n                                                <\/div>\n                                            <\/div>\n                                        <\/div>\n\n<div class=\"container\">\n                                            <div class=\"row\">\n                                                <div class=\"col-md-10 col-lg-9 offset-lg-1\">\n                                                    <p>At the same time, regulators and government officials are turning to more and more public responses related to cybersecurity, tightening their grip on corporate reputations through new rules and public scrutiny. With more stringent regulations and increased public reporting, organizations are being held accountable for how they manage and protect sensitive information. Meanwhile, a more cyber-savvy and skeptical public is quick to notice, and react to, any missteps.<\/p>\n\n                                                <\/div>\n                                            <\/div>\n                                        <\/div>\n\n<div class=\"container\">\n                                            <div class=\"row\">\n                                                <div class=\"col-md-10 col-lg-9 offset-lg-1\">\n                                                    <p><strong>Reputation and Technical Cyber Risk: A New Partnership<\/strong><\/p>\n\n                                                <\/div>\n                                            <\/div>\n                                        <\/div>\n\n<div class=\"container\">\n                                            <div class=\"row\">\n                                                <div class=\"col-md-10 col-lg-9 offset-lg-1\">\n                                                    <p>As the link between reputation and cyber risk grows stronger, IT and Communications teams can no longer afford to operate in silos. Their collaboration should go far beyond crafting post-incident press releases. Here\u2019s how these two critical teams can\u2014and should\u2014work together:<\/p>\n\n                                                <\/div>\n                                            <\/div>\n                                        <\/div>\n\n<div class=\"container\">\n                                            <div class=\"row\">\n                                                <div class=\"col-md-10 col-lg-9 offset-lg-1\">\n                                                    <ol class=\"wp-block-list\">\n<div class=\"container\">\n<div class=\"row\">\n<div class=\"col-md-10 col-lg-9 offset-lg-1\">\n<li><strong>Translate Complexity into Clarity:<\/strong><br \/>Technical teams understand the risks. Communications teams know how to craft messages that resonate. Together, they can ensure clear, concise explanation of core policies, risks, and responses both internally and externally.\n<\/li>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"container\">\n<div class=\"row\">\n<div class=\"col-md-10 col-lg-9 offset-lg-1\">\n<li><strong>Build a Culture of Security:<\/strong><br \/>It\u2019s not just about what you say, but how you make it stick. Developing a thoughtful strategy for culture change ensures that security messages are truly internalized throughout the organization.\n<\/li>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"container\">\n<div class=\"row\">\n<div class=\"col-md-10 col-lg-9 offset-lg-1\">\n<li><strong>Plan for the Unexpected:<\/strong><br \/>Effective scenario planning for data security and privacy risks requires tight coordination. Legal, technical, and Communications teams must work hand-in-hand to prepare for\u2014and respond to\u2014potential crises.<\/li><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/ol>\n\n                                                <\/div>\n                                            <\/div>\n                                        <\/div>\n\n<div class=\"container\">\n                                            <div class=\"row\">\n                                                <div class=\"col-md-10 col-lg-9 offset-lg-1\">\n                                                    <p><strong>The Benefits of Collaboration<\/strong><\/p>\n\n                                                <\/div>\n                                            <\/div>\n                                        <\/div>\n\n<div class=\"container\">\n                                            <div class=\"row\">\n                                                <div class=\"col-md-10 col-lg-9 offset-lg-1\">\n                                                    <p>When IT and Communications join forces, the results are tangible:<\/p>\n\n                                                <\/div>\n                                            <\/div>\n                                        <\/div>\n\n<div class=\"container\">\n                                            <div class=\"row\">\n                                                <div class=\"col-md-10 col-lg-9 offset-lg-1\">\n                                                    <ul class=\"wp-block-list\">\n<div class=\"container\">\n<div class=\"row\">\n<div class=\"col-md-10 col-lg-9 offset-lg-1\">\n<li>Stronger organizational alignment and buy-in<\/li><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"container\">\n<div class=\"row\">\n<div class=\"col-md-10 col-lg-9 offset-lg-1\">\n<li>Increased compliance with policies and regulations<\/li><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"container\">\n<div class=\"row\">\n<div class=\"col-md-10 col-lg-9 offset-lg-1\">\n<li>Faster, more effective crisis response<\/li><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/ul>\n\n                                                <\/div>\n                                            <\/div>\n                                        <\/div>\n\n<div class=\"container\">\n                                            <div class=\"row\">\n                                                <div class=\"col-md-10 col-lg-9 offset-lg-1\">\n                                                    <p>The specifics of this collaboration will vary but the playbook begins with early alignment on goals, KPIs, desired outcomes and a plan for communicating information to the appropriate stakeholders. Starting before a crisis hits ensures everyone in the organization is working towards shared outcomes.<\/p>\n\n                                                <\/div>\n                                            <\/div>\n                                        <\/div>\n\n<div class=\"container\">\n                                            <div class=\"row\">\n                                                <div class=\"col-md-10 col-lg-9 offset-lg-1\">\n                                                    <p>The threat landscape is only growing more complex and dangerous. While technical defenses are essential, they\u2019re not enough on their own. Real security comes from building awareness, engagement and trust across every level of your organization.<\/p>\n\n                                                <\/div>\n                                            <\/div>\n                                        <\/div>\n\n<div class=\"container\">\n                                            <div class=\"row\">\n                                                <div class=\"col-md-10 col-lg-9 offset-lg-1\">\n                                                    <p>If cybercriminals are evolving their tactics, organizations must evolve, too\u2014not just in how they defend against attacks, but in how they think about and communicate cyber risk.<\/p>\n\n                                                <\/div>\n                                            <\/div>\n                                        <\/div>\n\n<div class=\"container\">\n                                            <div class=\"row\">\n                                                <div class=\"col-md-10 col-lg-9 offset-lg-1\">\n                                                    <p><strong>More on Cybersecurity: <\/strong><a href=\"https:\/\/fleishmanhillard.com\/2025\/06\/cyber-crisis-communications\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Protecting Relationships in a Cyber Crisis<\/strong><\/a><\/p>\n\n                                                <\/div>\n                                            <\/div>\n                                        <\/div>\n\n\n<div class=\"container\" style=\"margin-top: 20px;\">\n<div class=\"row\">\n<div class=\"col-md-10 col-lg-9 offset-lg-1\">\n<p style=\"font-size: 20px;\"><img decoding=\"async\" class=\"alignnone wp-image-27431 \" style=\"float: left; margin: 0px 15px 15px 0px; width: 161px;\" src=\"https:\/\/fleishmanhillard.com\/wp-content\/uploads\/2025\/07\/Scott-R.jpg\" alt=\"Scott Radcliffe width=\" height=\"154\" \/> <em><strong>Scott Radcliffe<\/strong>\u00a0is FleishmanHillard\u2019s global director of cybersecurity, leading the firm\u2019s Cybersecurity Center of Excellence and advising clients on rising cyber risks. He recently rejoined FH from Apple, where he led cybersecurity communications and previously served as the agency\u2019s senior global data privacy and security expert.<\/em><\/p>\n<\/div>\n<\/div>\n<\/div>\n<div style=\"clear: left;\">\u00a0<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Trust is at the heart of every successful organization. In today\u2019s digital landscape, that trust is built\u2014and sometimes shattered\u2014by how well you protect the data on your network. Reputation is hard-won and easily lost, making it a favorite pressure point for cybercriminals and regulators alike. Over the past several years, threat actors have shifted tactics. [&hellip;]<\/p>\n","protected":false},"author":36,"featured_media":27788,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[23,1],"tags":[109,108],"class_list":["post-27786","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-expertise","category-uncategorized","tag-cyber-crisis","tag-cybersecurity"],"acf":[],"_links":{"self":[{"href":"https:\/\/fleishmanhillard.com\/wp-json\/wp\/v2\/posts\/27786","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fleishmanhillard.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fleishmanhillard.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fleishmanhillard.com\/wp-json\/wp\/v2\/users\/36"}],"replies":[{"embeddable":true,"href":"https:\/\/fleishmanhillard.com\/wp-json\/wp\/v2\/comments?post=27786"}],"version-history":[{"count":0,"href":"https:\/\/fleishmanhillard.com\/wp-json\/wp\/v2\/posts\/27786\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fleishmanhillard.com\/wp-json\/wp\/v2\/media\/27788"}],"wp:attachment":[{"href":"https:\/\/fleishmanhillard.com\/wp-json\/wp\/v2\/media?parent=27786"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fleishmanhillard.com\/wp-json\/wp\/v2\/categories?post=27786"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fleishmanhillard.com\/wp-json\/wp\/v2\/tags?post=27786"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}